-
1
-
-
47249131952
-
-
IEEE Standard 802.11-1999. Wireless LAN Medium Access Control and Physical Layer Specifications. 1999.
-
IEEE Standard 802.11-1999. Wireless LAN Medium Access Control and Physical Layer Specifications. 1999.
-
-
-
-
2
-
-
47249128427
-
-
R. L. Rivest. The RC4 Encryption Algorithm. RSA Data Security, Inc., Mar. 12, 1992. (Proprietary).
-
R. L. Rivest. The RC4 Encryption Algorithm. RSA Data Security, Inc., Mar. 12, 1992. (Proprietary).
-
-
-
-
3
-
-
0004104571
-
Unsafe At Any Key Size: An Analysis of the WEP Encapsulation,
-
03628E, IEEE 802.11 Committee, Mar
-
J. Walker, Unsafe At Any Key Size: An Analysis of the WEP Encapsulation, tech. report 03628E, IEEE 802.11 Committee, Mar. 2000.
-
(2000)
tech. report
-
-
Walker, J.1
-
4
-
-
0034777649
-
Intercepting mobile communications: The insecurity of 802.11
-
Rome, Italy, pp, July
-
N. Borisov, I. Goldberg, and D. Wagner, Intercepting mobile communications: The insecurity of 802.11. In Proc. of the 7th Annual ACM/EEE International Conf. on Mobile Computing and Networking - Mobicom'01, Rome, Italy, pp. 180-189, July 2001.
-
(2001)
Proc. of the 7th Annual ACM/EEE International Conf. on Mobile Computing and Networking - Mobicom'01
, pp. 180-189
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
6
-
-
0003477171
-
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP
-
Tech. Report TD-4ZCPZZ, AT&T Labs
-
A.Stubblefield, J.Ioannidis, A.Rubin, Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. Tech. Report TD-4ZCPZZ, AT&T Labs
-
-
-
Stubblefield, A.1
Ioannidis, J.2
Rubin, A.3
-
7
-
-
0022114816
-
Message authentication
-
Sept
-
R. Jueneman, S. Matyas, and C. Meyer. Message authentication. IEEE Comm. Magazine, 25(9):pp. 29-40, Sept. 1985.
-
(1985)
IEEE Comm. Magazine
, vol.25
, Issue.9
, pp. 29-40
-
-
Jueneman, R.1
Matyas, S.2
Meyer, C.3
-
9
-
-
47249090781
-
-
Core SDI. CRC32 compensation attack against ssh-1.5, July 1998: www.coresdi.com
-
Core SDI. CRC32 compensation attack against ssh-1.5, July 1998: www.coresdi.com
-
-
-
-
11
-
-
47249109269
-
-
Airsnort: airsnort.shmoo.com
-
Airsnort: airsnort.shmoo.com
-
-
-
-
12
-
-
47249100553
-
-
Aircrack: www.cr0.net:8040/code/network/
-
Aircrack
-
-
-
13
-
-
47249100116
-
-
WepLab: weplab.sourceforge.net/
-
WepLab: weplab.sourceforge.net/
-
-
-
-
14
-
-
47249105877
-
-
Airjack: sourceforge.net/projects/airjack
-
Airjack: sourceforge.net/projects/airjack/
-
-
-
-
15
-
-
47249101949
-
-
KisMAC: binaervarianz.de/projekte/
-
KisMAC: binaervarianz.de/projekte/
-
-
-
-
16
-
-
47249090339
-
-
Void11: www.wlsec.net/void11/
-
Void11
-
-
-
17
-
-
47249116015
-
-
IEEE P802.11i - 2004. Medium Access Control Security Enhancements. July 2004
-
IEEE P802.11i - 2004. Medium Access Control Security Enhancements. July 2004
-
-
-
-
18
-
-
47249163161
-
-
Advanced Encryption Standard (FIPS PUB 197). National Institute of Standards and Technology (NIST), November 2001.
-
"Advanced Encryption Standard (FIPS PUB 197)." National Institute of Standards and Technology (NIST), November 2001.
-
-
-
-
19
-
-
47249165493
-
-
IEEE Standard 802.1X-2004 Port-Based Network Access Control. December, 2004
-
IEEE Standard 802.1X-2004 Port-Based Network Access Control. December, 2004
-
-
-
-
20
-
-
13244299564
-
-
RFC 3748, June
-
B. Aboba, L. Blunk, J. Carlson, E. Levkowetz, and J. Vollbrecht, "Extensible authentication protocol ."RFC 3748, June 2004.
-
(2004)
Extensible authentication protocol
-
-
Aboba, B.1
Blunk, L.2
Carlson, J.3
Levkowetz, E.4
Vollbrecht, J.5
-
21
-
-
0013046241
-
An initial security analysis of the IEEE 802. IX standard. Technical Report
-
Dept. Of CS, Univ. of Maryland, Feb
-
A. Mishra and W. A. Arbaugh, An initial security analysis of the IEEE 802. IX standard. Technical Report, UMIACS-TR-2002-10, Dept. Of CS, Univ. of Maryland, Feb. 2002.
-
(2002)
UMIACS-TR-2002-10
-
-
Mishra, A.1
Arbaugh, W.A.2
-
22
-
-
47249141558
-
-
AusCERT. Denial of Service Vulnerability in IEEE 802.11 Wireless Devices . AusCERT AA-2004.02, Australian Computer Emergency Response Team, www.auscert.org.au/ ,2004.
-
AusCERT. Denial of Service Vulnerability in IEEE 802.11 Wireless Devices . AusCERT AA-2004.02, Australian Computer Emergency Response Team, www.auscert.org.au/ ,2004.
-
-
-
-
23
-
-
84925368904
-
802.11 Denial-of-Service attacks: Real vulnerabilities and practical solutions
-
August
-
J. Bellardo, and S. Savage. 802.11 Denial-of-Service attacks: real vulnerabilities and practical solutions. In Proc. of the USENIX Security Symposium, pp. 15-28, August, 2003.
-
(2003)
Proc. of the USENIX Security Symposium
, pp. 15-28
-
-
Bellardo, J.1
Savage, S.2
-
25
-
-
47249159295
-
-
J. Wright, Detecting Wireless LAN MAC Address Spoofing, home.jwu.edu/jwright
-
J. Wright, Detecting Wireless LAN MAC Address Spoofing, home.jwu.edu/jwright/
-
-
-
-
26
-
-
34547139799
-
Security in an Insecure WLAN Network
-
F. Anjum, S. Das, P. Gopalakrishnan, L. Kant, K. Byungsuk, Security in an Insecure WLAN Network, In Proc. of the International Conf. on Wireless Networks, Communications and Mobile Computing, 2005, pp. 292- 297
-
(2005)
Proc. of the International Conf. on Wireless Networks, Communications and Mobile Computing
, pp. 292-297
-
-
Anjum, F.1
Das, S.2
Gopalakrishnan, P.3
Kant, L.4
Byungsuk, K.5
-
28
-
-
27544454487
-
Multilevel Monitoring and Detection Systems (MMDS)
-
Canada, June
-
D. Dasgupta, F. Gonzalez, K. Yallapu and M. Kaniganti. Multilevel Monitoring and Detection Systems (MMDS). In Proc. of the 15th Annual Computer Security Incident Handling Conf. (FIRST), Canada, June, 2003
-
(2003)
Proc. of the 15th Annual Computer Security Incident Handling Conf. (FIRST)
-
-
Dasgupta, D.1
Gonzalez, F.2
Yallapu, K.3
Kaniganti, M.4
-
29
-
-
85139567592
-
802.11 Network Intrusion Detection using Genetic Programming
-
Washington, D.C
-
P. LaRoche, A. N. Zincir-Heywood, 802.11 Network Intrusion Detection using Genetic Programming, In Proc. of the 2005 workshops on Genetic and evolutionary computation, Washington, D.C, 2005,pp. 170 - 171
-
(2005)
Proc. of the 2005 workshops on Genetic and evolutionary computation
, pp. 170-171
-
-
LaRoche, P.1
Zincir-Heywood, A.N.2
-
30
-
-
47249134897
-
Relationship-based Detection of Spoofing and Anomalous Traffic in Wireless Networks
-
Q. Li, W. Trappe, Relationship-based Detection of Spoofing and Anomalous Traffic in Wireless Networks, Presentation, www.winlab.rutgers.edu/pub/docs/iab/ 2005Fall/
-
Presentation
-
-
Li, Q.1
Trappe, W.2
-
31
-
-
47249152152
-
Detecting and Blocking Unauthorized Access in Wi-Fi Networks
-
H. Xia, and J. Brustoloni, Detecting and Blocking Unauthorized Access in Wi-Fi Networks. In Proc. of Networking'2004
-
Proc. of Networking'2004
-
-
Xia, H.1
Brustoloni, J.2
-
32
-
-
47249143601
-
-
SpoofMAC
-
SpoofMAC: www.klcconsulting.net/smac/
-
-
-
-
33
-
-
47249139393
-
-
Airsnarf: airsnarf.shmoo.com
-
Airsnarf: airsnarf.shmoo.com
-
-
-
|